An unprecedented letter from the US Congress, released today, accuses the UK of “a foreign cyberattack waged through political means”….
Over a hundred cyber security experts, companies and civil society groups have signed a letter calling for the Home Secretary,…
Zacks Investment Research (Zacks) last year reportedly suffered another data breach that exposed sensitive information related to roughly 12 million…
North Korean state-sponsored group Kimsuky (aka Emerald Sleet, aka VELVET CHOLLIMA) is attempting to deliver malware to South Korean targets…
Valentine’s Day 2025 is just around the corner, and many men are likely busy picking out thoughtful gifts to impress…
Feb 13, 2025Ravie LakshmananWeb Security / Cloud Security A widespread phishing campaign has been observed leveraging bogus PDF documents hosted…
As the European Union (EU) prepares to respond to Trump’s 25% tariff on aluminium and steel, a widely reported paper…
China-linked APTs’ tool employed in RA World Ransomware attack Pierluigi Paganini February 13, 2025 A November 2024 RA World ransomware…
Over half a billion websites are powered by WordPress as of today. Unfortunately, not every instance deserves the same security…
A China-based threat actor, tracked as Emperor Dragonfly and commonly associated with cybercriminal endeavors, has been observed using in a ransomware…
Introduction The mobile application landscape is more dynamic and challenging than ever, with businesses increasingly relying on mobile channels to…
New Astaroth Phishing Kit bypasses 2FA (two-factor authentication) to steal Gmail, Yahoo and Microsoft login credentials using a reverse proxy,…











